In addition to protecting the established key from an attacker, the STS protocol uses no timestamps and provides perfect forward secrecy. It also requires two-way explicit key confirmation, making it an Authenticated key agreement with Key Confirmation (Acronym: AKC) protocol.